SonicWALL TZ 300/TZ 300W, TZ 300P, TZ 350/TZ 350W, TZ 400/TZ 400W, TZ 500/TZ 500W, TZ 600, TZ 600P, SOHO W, SOHO 250/SOHO 250W, SM 9200, SM 9400, SM 9600 and NSa 2650, NSa 3600, NSa 3650, NSa 4600, NSa 4650, NSa 5600, NSa 5650, NSa 6600, NSa 6650, NSa 9250, NSa 9450, NSa 9650

Certificate #3658

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 26.05.2020 , 17.05.2021
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Cryptographic Module Specification: Level 3
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.
Version (Hardware) 101-500403-55 Rev. F (TZ 300), 101-500404-54 Rev. E (TZ 300W), 101-500582-52 Rev A (TZ 300P), 101-500622-52 Rev A (TZ 350), 101-500621-51 Rev A (TZ 350W), 101-500405-55 Rev. F (TZ 400), 101-500406-54 Rev. E (TZ 400W), 101-500411-56 Rev. G (TZ 500), 101-500412-55 Rev. F (TZ 500W), 101-500413-56 Rev. G (TZ 600), 101-500581-51 Rev A (TZ 600P), 101-500410-54 Rev. E (SOHO W), 101-500624-51 Rev A (SOHO 250), 101-500623-52 Rev A (SOHO 250W), 101-500455-54 Rev. E (SM 9200), 101-500454-54 Rev. E (SM 9400), 101-500453-54 Rev. E (SM 9600), 101-500452-50 Rev. A (NSa 2650), 101-500459-54 Rev. E (NSa 3600), 101-500514-50 (NSa 3650), 101-500458-54 Rev. E (NSa 4600), 101-500451-50 (NSa 4650), 101-500457-54 Rev. E (NSa 5600), 101-500517-50 (NSa 5650), 101-500456-54 Rev. E (NSa 6600), 101-5005518-50 Rev A (NSa 6650), 101-500520-50 Rev A (NSa 9250), 101-500519-50 Rev A (NSa 9450), 101-500449-50 Rev A (NSa 9650)
Version (Firmware) SonicOS v6.5.4
Vendor SonicWall, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
RSA 2048, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-3, MD5, PBKDF
Schemes
Key Exchange, Key Agreement
Protocols
SSH, SSL, TLS, TLS 1.0, TLS 1.2, IKE, IKEv1, IKEv2, IPsec, VPN
Randomness
DRBG
Elliptic Curves
P-224, P-256, P-384, P-521, P-192
Block cipher modes
ECB, CBC, CTR, GCM, CCM
TLS cipher suites
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

Security level
Level 2
Certification process
out of scope, service. Any other firmware version that is not listed in the module certificate is considered out of scope and requires separate FIPS 140-2 certificate. 11 MD5 (no security claimed) and keys derived from

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, FIPS PUB 202, SP 800-90A, RFC 5288, RFC 5246

File metadata

Subject FIPS 140-2 Security Policy Template
Author Usha Sanagala
Creation date D:20200511121918-04'00'
Modification date D:20200511121918-04'00'
Pages 63
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

CPE matches

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3658,
  "dgst": "34835db382b8c78f",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KTS#C743",
        "DRBG#C743",
        "HMAC#C743",
        "CVL#C743",
        "AES#C743",
        "SHS#C743",
        "RSA#C743",
        "ECDSA#C743"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_350w:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.5.4"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 9
          }
        },
        "FF": {
          "DH": {
            "DH": 11,
            "Diffie-Hellman": 12
          },
          "DSA": {
            "DSA": 4
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "service. Any other firmware version that is not listed in the module certificate is considered out of scope and requires separate FIPS 140-2 certificate. 11 MD5 (no security claimed) and keys derived from": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "CCM": {
          "CCM": 1
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 26,
          "IKEv1": 6,
          "IKEv2": 6
        },
        "IPsec": {
          "IPsec": 25
        },
        "SSH": {
          "SSH": 6
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 42,
            "TLS 1.0": 1,
            "TLS 1.2": 2
          }
        },
        "VPN": {
          "VPN": 33
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-192": 4,
          "P-224": 12,
          "P-256": 22,
          "P-384": 14,
          "P-521": 14
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128 and 256": 1,
          "AES CBC 128/192/256": 3,
          "AES [197": 1,
          "HMAC SHA(1": 1,
          "HMAC [198": 1,
          "HMAC-SHA-256": 4,
          "HMAC-SHA-384": 4,
          "HMAC-SHA-512": 4,
          "RSA 2048": 1,
          "SHA (256": 3,
          "SHA(1": 13,
          "SHA(256": 13,
          "SHA- 256": 1,
          "SHA-1": 9,
          "SHA-256": 6,
          "SHA-3": 1,
          "SHA-384": 4,
          "SHA-512": 3,
          "SHA2-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "PBKDF": {
          "PBKDF": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-256": 7,
            "SHA-384": 3,
            "SHA-512": 4
          },
          "SHA3": {
            "SHA-3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 17
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 74,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 202": 1,
          "FIPS140-2": 1
        },
        "NIST": {
          "SP 800-90A": 6
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 6
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 5,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 2,
            "HMAC-SHA-512": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Usha Sanagala",
      "/CreationDate": "D:20200511121918-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20200511121918-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "pdf_file_size_bytes": 3225843,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 63
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "eba22b3c8f1b5c331aa6ea19bfa56b01d400447cacda332dab0c58ffd98c4a1f",
    "policy_txt_hash": "cf5a3415da08f96fbc7593ad24ed2428c69c3deb3dd3d60bbc6991b05aaaaf2d"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2020_010620_1115.pdf",
    "date_sunset": null,
    "description": "The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Cryptographic Module Specification: Level 3",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "SonicOS v6.5.4",
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": "101-500403-55 Rev. F (TZ 300), 101-500404-54 Rev. E (TZ 300W), 101-500582-52 Rev A (TZ 300P), 101-500622-52 Rev A (TZ 350), 101-500621-51 Rev A (TZ 350W), 101-500405-55 Rev. F (TZ 400), 101-500406-54 Rev. E (TZ 400W), 101-500411-56 Rev. G (TZ 500), 101-500412-55 Rev. F (TZ 500W), 101-500413-56 Rev. G (TZ 600), 101-500581-51 Rev A (TZ 600P), 101-500410-54 Rev. E (SOHO W), 101-500624-51 Rev A (SOHO 250), 101-500623-52 Rev A (SOHO 250W), 101-500455-54 Rev. E (SM 9200), 101-500454-54 Rev. E (SM 9400), 101-500453-54 Rev. E (SM 9600), 101-500452-50 Rev. A (NSa 2650), 101-500459-54 Rev. E (NSa 3600), 101-500514-50 (NSa 3650), 101-500458-54 Rev. E (NSa 4600), 101-500451-50 (NSa 4650), 101-500457-54 Rev. E (NSa 5600), 101-500517-50 (NSa 5650), 101-500456-54 Rev. E (NSa 6600), 101-5005518-50 Rev A (NSa 6650), 101-500520-50 Rev A (NSa 9250), 101-500519-50 Rev A (NSa 9450), 101-500449-50 Rev A (NSa 9650)",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "SonicWALL TZ 300/TZ 300W, TZ 300P, TZ 350/TZ 350W, TZ 400/TZ 400W, TZ 500/TZ 500W, TZ 600, TZ 600P, SOHO W, SOHO 250/SOHO 250W, SM 9200, SM 9400, SM 9600 and NSa 2650, NSa 3600, NSa 3650, NSa 4600, NSa 4650, NSa 5600, NSa 5650, NSa 6600, NSa 6650, NSa 9250, NSa 9450, NSa 9650",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-05-26",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-05-17",
        "lab": "Acumen Security",
        "validation_type": "Update"
      }
    ],
    "vendor": "SonicWall, Inc.",
    "vendor_url": "http://www.sonicwall.com/"
  }
}